Close Menu
Insurance Journal – Property Casualty Insurance News

    Subscribe to Updates

    Get the latest creative news from FooBar about art, design and business.

    What's Hot

    No title available due to garbled original content

    July 3, 2025

    Life Insurers Increase Private Debt Investments in Search for Higher Yields

    July 3, 2025

    Central Bank of India Strengthens Insurance Business with Generali Partnership

    July 3, 2025
    Facebook X (Twitter) Instagram
    Insurance Journal – Property Casualty Insurance NewsInsurance Journal – Property Casualty Insurance News
    Facebook X (Twitter) Instagram
    SUBSCRIBE
    • Home
    • Business Insurance
    • Identity Protection
    • Life Insurance
    • Pets Insurance
    • Property Insurance
    • Vevehicle Insurance
    Insurance Journal – Property Casualty Insurance News
    Home ยป Proactive Threat Hunting with CrowdStrike Falcon Identity Protection
    Identity Protection

    Proactive Threat Hunting with CrowdStrike Falcon Identity Protection

    insurancejournalnewsBy insurancejournalnewsFebruary 24, 2025No Comments3 Mins Read
    Facebook Twitter Pinterest LinkedIn Tumblr Reddit WhatsApp Email
    Share
    Facebook Twitter LinkedIn Pinterest WhatsApp Email

    Proactive Threat Hunting with CrowdStrike Falcon Identity Protection

    Cyberattacks increasingly target identities. Think of it like this: instead of breaking down a door, attackers are using valid credentials to waltz right in. This allows them to bypass security layers and achieve their goals faster.

    CrowdStrike Falcon Identity Protection provides tools to actively hunt for identity-related threats. Its user-friendly search function makes it easy to find events of interest, helping you to stop breaches before they happen.

    Screenshot of the Threat Hunter interface within CrowdStrike Falcon Identity Protection.
    Screenshot of the Threat Hunter interface within CrowdStrike Falcon Identity Protection.

    Using Threat Hunter

    From the main menu, go to Identity Protection -> Threat Hunter. This section displays all identity events, including:

    • Access events (e.g., RDP)
    • User account events (e.g., password changes)
    • Identity detections (e.g., honeytoken activity)

    Use the filters at the top of the screen to hone your search. These filters are divided into five categories:

    • Event Types: Authentication types, service, user account events, and more.
    • General: Sort order, time zone, and more.
    • Identity: Username, department, privileges, attributes, and more.
    • Source Endpoint: Endpoint name, group, organizational unit (OU), attributes, and more.
    • Destination: Destination name, group, privileges, attributes, and more.

    Building a Threat Hunter Search

    One common tactic is to look for unusual activity. For example, you could look for programmatic accounts with unusual access events.

    Programmatic accounts are typically non-human. For instance, it’s unlikely for one to use a service like Remote Desktop for access. Falcon Identity Protection automatically classifies identities, labeling them as programmatic, human, etc. You can leverage these attributes to filter your search results.

    Screenshot demonstrating selecting the 'Programmatic' filter under the 'Identity' category within CrowdStrike Falcon Identity Protection.
    Screenshot demonstrating selecting the ‘Programmatic’ filter under the ‘Identity’ category within CrowdStrike Falcon Identity Protection.

    To build a search:

    1. In the Identity filter, click the checkbox next to “programmatic”.
    2. In the Event Types category, select the Service dropdown to expand options.
    3. Select the checkbox next to “Remote Desktop (RDP)”. Screenshot showing the Event Types filter with 'Remote Desktop (RDP)' selected, along with other possible event types.
    4. Set the time filter to 7 days (or select a custom timeframe).
    5. Click “Hunt” in the upper right corner.
    Screenshot showing the 'Hunt' button in the top right corner of the Threat Hunter interface.
    Screenshot showing the ‘Hunt’ button in the top right corner of the Threat Hunter interface.
    Screenshot of time frame filters.
    Screenshot of time frame filters.
    Screenshot of filter categories in CrowdStrike Falcon Identity Protection.
    Screenshot of filter categories in CrowdStrike Falcon Identity Protection.

    Investigating Events

    When investigating in Threat Hunter, clicking on an event reveals detailed information, such as the protocol, source, and service used.

    For example, you might find that a programmatic account called Administrator accessed a domain controller via remote desktop.

    Screenshot showing the expanded details of an event within the Threat Hunter interface, including information about the protocol, source, and service used.
    Screenshot showing the expanded details of an event within the Threat Hunter interface, including information about the protocol, source, and service used.

    Quickly take action on entities (users and endpoints) directly from the Threat Hunter page. Clicking on an account expands information and provides options like adding entities like users and endpoints to a watchlist, which signals increased risk.

    Screenshot showing an example of a Threat Hunter investigation, including actions that can be taken on the investigated item.
    Screenshot showing an example of a Threat Hunter investigation, including actions that can be taken on the investigated item.

    Saving Threat Hunter Searches

    Save frequently used Threat Hunter searches for future use. Click the three dots and then “Save As Custom Search”. To use it later, select it from the Saved Searches dropdown.

    Screenshot of the 'Save As Custom Search' option in the Threat Hunter interface.
    Screenshot of the ‘Save As Custom Search’ option in the Threat Hunter interface.
    Screenshot demonstrating how to load a saved search in the Threat Hunter interface.
    Screenshot demonstrating how to load a saved search in the Threat Hunter interface.

    CrowdStrike Falcon Identity Protection provides accessible yet powerful tools for proactive threat hunting, offering visibility into your entire identity environment. This allows you to identify and respond to threats before they cause significant damage.

    CrowdStrike cybersecurity Falcon Identity Protection identity protection security threat hunting
    insurancejournalnews
    • Website

    Related Posts

    No title available in the original content

    July 3, 2025

    Iowa Removes Gender Identity from Civil Rights Code, Leaving Transgender Residents Vulnerable

    July 2, 2025

    Aura vs. Experian IdentityWorks 2025: Comprehensive Comparison

    July 1, 2025
    Leave A Reply Cancel Reply

    Don't Miss

    No title available due to garbled original content

    By insurancejournalnewsJuly 3, 20250

    The original content appears to be corrupted or encoded incorrectly, making it impossible to determine the original topic or subject matter.

    Life Insurers Increase Private Debt Investments in Search for Higher Yields

    July 3, 2025

    Central Bank of India Strengthens Insurance Business with Generali Partnership

    July 3, 2025

    Climate Advocacy Group Urges Ontario Regulator to Address Rising Home Insurance Rates

    July 3, 2025
    Stay In Touch
    • Facebook
    • Twitter
    • Pinterest
    • Instagram
    • YouTube
    • Vimeo
    Our Picks

    No title available due to garbled original content

    July 3, 2025

    Life Insurers Increase Private Debt Investments in Search for Higher Yields

    July 3, 2025

    Central Bank of India Strengthens Insurance Business with Generali Partnership

    July 3, 2025

    Climate Advocacy Group Urges Ontario Regulator to Address Rising Home Insurance Rates

    July 3, 2025

    Subscribe to Updates

    Get the latest creative news from SmartMag about art & design.

    Demo
    New

    Montana Eyes Workers’ Comp for First Responders with PTSD

    February 24, 2025

    Best Home and Auto Insurance Deals for Veterans

    February 24, 2025

    Pennsylvania Insurance Department: Protecting Consumers and Regulating the Insurance Market

    February 24, 2025
    Categories
    • Business Insurance (1,817)
    • Identity Protection (521)
    • Life Insurance (1,724)
    • New (5,577)
    • Pets Insurance (517)
    • Property Insurance (980)
    • Vevehicle Insurance (462)

    No title available due to garbled original content

    By insurancejournalnewsJuly 3, 20250
    Facebook X (Twitter) Instagram Pinterest
    © 2025 Insurance Journal News. Designed by Insurance Journal New.

    Type above and press Enter to search. Press Esc to cancel.